Risk
1/23/2012
06:01 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google+ Accepts Pseudonyms, With Caveats

Google+ updated name policy stops short of unqualified pseudonym acceptance, but endorses use of "established" alternate names.

10 Essential Google+ Tips
Slideshow: 10 Essential Google+ Tips
(click image for larger view and for slideshow)
Google has revised its much-maligned name policy for Google+ Profiles to include support for nicknames, non-Roman scripts, and, to a limited extent, pseudonyms.

When Google+ launched last year, Google insisted that users identify themselves with the name by which they're commonly known. When users complained about the lack of support for pseudonyms, Google made some adjustments but stopped short of embracing names that conceal identity.

Now Google has given a bit more ground, although its revised policy, perhaps inevitably, remains rather ambiguous.

Bradley Horowitz, Google's VP of product, announced the change in a post on Google+. Based on feedback from the 1% of would-be Google+ users appealing denials of their desired Profile name, Horowitz said that 60% of users simply want to add a nickname, that 20% are businesses that are inadvertently trying to use Google+ Profiles rather than Google Pages to establish their Google+ presence, and that 20% are looking to use a pseudonym or other unconventional name.

[ What was the problem with the Google+ name policy? Read 5 Reasons Google+'s Name Policy Fails. ]

To address this feedback, Google over the next week will add support for nicknames and names written in an alternate script, like Cyrillic or Arabic, for example. These names will be presented alongside users' common names, rather than in place of them. Thus, a nickname will augment but not conceal a user's identifying name.

Conceding that Google has sometimes flagged names it should not have, Horowitz also said, "[W]e're updating our policies and processes to broaden support for established pseudonyms, from +trench coat to +Madonna."

Note the use of the word "established." Google is officially recognizing the presence of online pseudonymous personalities, like Thomas Hawk, whose presence on Google+ previously was inconsistent with Google's position on pseudonyms.

However, this isn't merely a formalization of Google's favoritism toward the famous, whereby services like Hangouts On Air are offered first to celebrities and those rich in followers. It's the de facto acceptance of reasonable, non-offensive pseudonyms.

If you open a Google+ account and lay claim to a pseudonym by which you're not already known, chances are Google won't allow it, if anyone at the company finds out. Try starting an account under the name "Larry Page" to find out more about the name-flagging process.

At the same time, building an online pseudonym to the point of being "established" should be relatively easy. With a few online posts as "SuperPundit," a handful of Twitter followers, and a few links to your website--search engine optimization 101--you're probably ready to participate in the Google social protection program, aka pseudonymous Google+. Horowitz suggests that possible criteria for establishing a pseudonym might be, among other things, a "meaningful following," whatever that means.

A Google spokesperson more or less conceded that Google isn't likely to be able to distinguish between real and fake names if those names don't call attention to themselves. If you sign up for Google+ under a pseudonym that sounds like a common name, Bob Smith for example, chances are no one at Google will ever know, unless someone rats you out. So between the fact that Google doesn't really want to subject every name to close scrutiny, and the fact that pseudonyms can be established with relative ease, expressing one's identity on Google+ is now subject to relatively few constraints.

Horowitz says that Google will continue to refine its handling of names and identity in the months to come. For now, the name policy on Google+ looks a bit more privacy-friendly than the name policy on Facebook.

Social media are generating tons of data, but that data only becomes truly valuable when examined in context. Attend the virtual Enterprise 2.0 event Social Analytics: The Bridge To Business Value, and learn how social analytics will provide the bridge to unlocking business value. It happens Feb. 16.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Seebs
50%
50%
Seebs,
User Rank: Apprentice
1/27/2012 | 12:23:48 AM
re: Google+ Accepts Pseudonyms, With Caveats
I don't buy it. I've been using the name "seebs" pretty much exclusively for close to twenty years now. My boss, my coworkers, my lawyer, my neighbors, my spouse, and my friends all call me "seebs". I am not allowed to use that name. There is no possibility of discussion, explanation, or conversation. I am not permitted to offer even a single word in defense of the name people call me by in real life. I just get told no. They haven't even said why, and there is no way to ask.

It's a publicity stunt, not a sincere response to the very real need for pseudonymity in the online world. They aren't serious about it. They are not making even a good faith effort to solve the problem.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-2214
Published: 2015-03-05
NetCat 5.01 and earlier allows remote attackers to obtain the installation path via the redirect_url parameter to netshop/post.php.

CVE-2015-2215
Published: 2015-03-05
Open redirect vulnerability in the Services single sign-on server helper (services_sso_server_helper) module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified parameters.

CVE-2015-2216
Published: 2015-03-05
SQL injection vulnerability in ecomm-sizes.php in the Photocrati theme 4.x for WordPress allows remote attackers to execute arbitrary SQL commands via the prod_id parameter.

CVE-2015-2218
Published: 2015-03-05
Multiple cross-site scripting (XSS) vulnerabilities in the wp_ajax_save_item function in wonderpluginaudio.php in the WonderPlugin Audio Player plugin before 2.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) item[name] or (2) item[customcss] parameter in a w...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.